Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Distributed Computer Systems

Assignment: Reliable Online Auction System Introduction

In this assignment, you are required to implement a reliable online auction system for multiple users. The system has the following features:

1. The client needs to log in to enter the auction. The server will then check whether the user name and password received from the user are correct.

2. If the authentication is correct, the auction frame will be displayed and the client will be added to the user list maintained by the server.

3. The item on auction has a minimum bid and a default increment. The bid placed will be checked to make sure it is higher than the current bid.

4. After a new bid is placed by one of the clients, the server will broadcast it to all clients.

5. A timer is implemented to keep a time limit for the next bid. The time left is displayed on screen to remind the clients.

6. When a new user logs in or a new bid is raised, the timer will be reset back.

7. After the time expires, the server will choose the user who placed the last bid as the winner, and broadcast to all clients that the auction has finished and he loses or wins.

In order to provide a reliable service, there are two replicated servers with the same interface of the service: primary and backup, as shown in the following figure. The primary and backup servers are located on different machines for fault tolerance. On the client side, there is a piece of client program running on client machines. When a client requests a service, the request is always first sent to the primary server if it is alive; otherwise it switches to the backup.

When the primary server is operational, the backup is largely passive. Each time when the primary server completes serving a request, it forwards its internal state (e.g. the list of active users and the current bid item, and other system state information) to the backup, keeping the backup server consistent with the primary.

Note that the communication between the two servers, and between clients and the servers is done via message exchanges over TCP/IP.

There is a possibility that the primary server fails in the middle of its processing of a request and all of the information is lost. This includes the list of active users and the current bidding status. Upon the detection of the failure of the primary server, the client program will switch to the backup server. The backup then becomes the primary and begins to serve requests from clients. The client program will direct all subsequent requests to the new primary server. When the failed server recovers, it will synchronize its local state with the working server. The probability of simultaneous failure of both servers is assumed to be negligible.

To simulate the failure of the server program, you may explicitly kill a server process. You may restart a server program as the simulation of a server's recovery from a fault. Assume that the client program knows where the primary and backup servers are.

Your jobs

You are required to implement the system using sockets programming for message exchange over TCP/IP. You may choose any programming language provided that it provides low-level socket APIs. Java and Java sockets or datagrams are recommended as a tutorial will be given on networking programming using Java, and practical programming exercises will be given at the first tutorial session. You are NOT allowed to use high-level APIs (e.g. Java RMI) or client-server tools for message exchange purposes. The purpose of this assignment is to gain experience using TCP and sockets programming and to investigate the reliability issues.

You may need to make your own reasonable assumptions and decisions for unspecified design and implementation details. Your system may run on the same machine with two server processes, S1 and S2, and several client processes. Your system should be able to survive the following failures:

1. normal cases where both servers are working;

2. kill the server on S1. The clients should automatically switch to the server on S2;

3. restart S1. The internal state of S1 should be automatically synchronized with S2;

4. kill the server on S2. The clients should automatically switch to the server on S1.

Continual Assessment

This assignment involves substantial programming work. In order to ensure that you make a good progress in your work, you are required to demonstrate your partially- implemented system as the different milestones of development at the second and third tutorial sessions and your final system at the last tutorial session.

You are also required to submit an assignment report documenting the system design and implementation details and a CD having the system source code. The report may include the following sections:

- Introduction

- System Architecture

- Discussion on System Design Issues

- Program Design and Implementation and Testing Results

- Evaluation (Objectives, learning experiences and difficulties)

- Conclusions

- References

Your work will be evaluated and given marks based on the following criteria: Milestone A (second tutorial)

1. An auction server is able to serve multiple users

2. The server is able to authenticate the user

3. The auction items can be displayed on the user screen

Milestone B (third tutorial) Server functions:

1. The system is able to check the minimum bid

2. The system is able to check the validity of bids

3. The system is able to check bids after the time limit

4. The system is able to broadcast the winning bid to clients

5. The system is able to notify the time left. User Interfaces

1. Users can see other bidders and the bidding status

2. Users are notified of invalid bids

3. Users can see the time left for a bid

4. Overall screen design

Milestone C Reliability functions:

1. The backup is kept the updated status

2. The backup is able to take over upon the primary failure

3. Clients are able to switch to the backup after the take-over

4. The primary resumes operations upon recovery and is able to synchronize the updated information

5. The primary is able to take over upon the backup failure

6. Clients are able to switch to the primary after the take-over Presentation on system design:

7. Presentation on system design issues, options, and trade-off made

Report

The content of the report

1. System Architecture

2. Identification of System Design Issues

3. Discussion pros and cons and trade-off made

4. Program Design, Implementation and Testing Results

5. Evaluation

6. Overall report organization and presentations using diagrams and tables

7. Individual Member's Reflection

The following are some suggestions:
- Which parts of the assignment you have contributed?
- What difficulties you have encountered?
- What you have learned?
- If time allows you to do it again, what improvements you would do about the system?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92001639

Have any Question?


Related Questions in Computer Engineering

Describe 2 variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

An equally weighted portfolio consists of 64 assets which

An equally weighted portfolio consists of 64 assets which all have a standard deviation of 0.276. The average covariance between the assets is 0.106. Compute the standard deviation of this portfolio. Please enter your an ...

Of 144 single women 41 had breast cancer 209 who were

Of 144 single women 41% had breast cancer, 209 who were married 52.2% had breast cancer and of 89 life bing with family 59.6% had breast cancer. Find the p value for the relationship?

Explain a business process you are familiar with describe

Explain a business process you are familiar with. Describe how a computer-based information system is related (or used) in this business process. Explain how a computer-based information systems can improve the efficienc ...

In c languageread a integer number which has 2 digits after

In C language: Read a integer number which has 2 digits after the decimal point. The number also has at least 6 digits the decimal point. Extract all digits at even positions from before the decimal point. Print them in ...

A manager has a 250 million portfolio that consists of 40

A manager has a $250 million portfolio that consists of 40% stock and 60% bonds. The beta of the stock position is 1.4. The modified duration of the bond position is 5. The manager wishes to achieve an effective mix of 7 ...

Electric car technology has been improving and the us shale

Electric car technology has been improving and the U.S. shale gas oil supply has been increasing. What will be the impact on the crude oil market price? What will be the impact on the gas-burning auto market price? Expla ...

Question suppose that in game of chance you bet an initial

Question : Suppose that in game of chance, you bet an initial amount of money, and every time you play, the money is doubled with probability p and halved with probability 1 - p. (a) What value of p gives you an expected ...

Sql transactions exercisesperform the test for the

SQL Transactions Exercises Perform the test for the non-additive join property (lossless join) for the relation R(A 1 , A 2 , A 3 , A 4 , A 5 ), and the decompositions D a , D b , D c , D d  and set of functional depende ...

Question suppose we have a hash table which has the hash

Question : Suppose we have a hash table which has the hash function integer % 13. For Quadratic and Linear Probing, what sequence of 13 different integers > 0 (positive) would create a worst-case situation over the entir ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As